-
2
-
-
79951682428
-
Network Intrusion Detection based on rough set and k-nearest neighbour
-
A.O. Adetunmbi, S.O. Falaki, O.S. Adewale and B.K. Alese, Network Intrusion Detection based on rough set and k-nearest neighbour, Intl Journal of computing and ICT research 2(1) (2008), 60-66.
-
(2008)
Intl Journal of computing and ICT research
, vol.2
, Issue.1
, pp. 60-66
-
-
Adetunmbi, A.O.1
Falaki, S.O.2
Adewale, O.S.3
Alese, B.K.4
-
3
-
-
0038428854
-
Results of the KDD’99 classifier learning
-
C. Elkan, Results of the KDD’99 classifier learning, SIGKDD Explorations 1(2) (2000), 63-64.
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
4
-
-
35248819234
-
Using decision tree to improve signature based intrusion detection
-
(Vol. 2820), G. Vigna, E. Jonsson and C. Kruegel, eds, Lecture Notes in Computer Science
-
C. Krugel and T. Toth, Using decision tree to improve signature based intrusion detection, in: Proceedings of RAID, (Vol. 2820), G. Vigna, E. Jonsson and C. Kruegel, eds, Lecture Notes in Computer Science, 2003, pp. 173-191.
-
(2003)
Proceedings of RAID
, pp. 173-191
-
-
Krugel, C.1
Toth, T.2
-
6
-
-
84920389231
-
An intrusion detection model
-
IEEE Computer Society Press, USA
-
D.E. Denning, An intrusion detection model, IEEE Trans. On Software Engineering SE-13(2) (1987), 118-131. IEEE Computer Society Press, USA.
-
(1987)
IEEE Trans. On Software Engineering
, vol.SE-13
, Issue.2
, pp. 118-131
-
-
Denning, D.E.1
-
7
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
NewYork, Jun
-
D. Barbara, J. Couto, S. Jajodia, L. Popyack and N. Wu, ADAM: Detecting intrusions by data mining, in: Proceedings of 2nd Annual IEEE workshop on Infor Assu Secur, NewYork, Jun 2001, pp. 11-16.
-
(2001)
Proceedings of 2nd Annual IEEE workshop on Infor Assu Secur
, pp. 11-16
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
8
-
-
84941079784
-
A new approach to intrusion detection using artificial neural networks and fuzzy clustering
-
Elsevier
-
G. Wang, J. Hao, J. Ma and L. Huang, A new approach to intrusion detection using artificial neural networks and fuzzy clustering, Expert system with applications 37 (2010), 6225-6232, Elsevier.
-
(2010)
Expert system with applications
, vol.37
, pp. 6225-6232
-
-
Wang, G.1
Hao, J.2
Ma, J.3
Huang, L.4
-
9
-
-
0026850007
-
A neural network component for an intrusion detection system
-
Oakland, CA, May
-
H. Debar and B. Dorizzi, A neural network component for an intrusion detection system, in: Proceedings of the IEEE Computer Society. Symposium on research in security and privacy, Oakland, CA, May 1992, pp. 240-250.
-
(1992)
Proceedings of the IEEE Computer Society. Symposium on research in security and privacy
, pp. 240-250
-
-
Debar, H.1
Dorizzi, B.2
-
10
-
-
57049093231
-
Application of data mining to network intrusion detection: Classifier selection model
-
(Vol. 5297), Y. Ma, D. Choi and S. Ata, eds, Lecture notes in computer science, Springer
-
H.A. Nguyen and D. Choi, Application of data mining to network intrusion detection: classifier selection model, in: Proceedings of Challenges for Next Generation Network Operations and Service Management (APNMOS 2008), (Vol. 5297), Y. Ma, D. Choi and S. Ata, eds, Lecture notes in computer science, Springer, 2008, pp. 399-408.
-
(2008)
Proceedings of Challenges for Next Generation Network Operations and Service Management (APNMOS 2008)
, pp. 399-408
-
-
Nguyen, H.A.1
Choi, D.2
-
12
-
-
44249089794
-
Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system
-
Feb
-
J.-H. Lee, J.-H. Lee, S.-G. Sohn, J.-H. Ryu and T.-M. Chung, Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system, in: Proceedings of 10th Intl. Conf. on Advanced Communication Technology (ICACT 2008), Feb 2008, pp. 1170-1175.
-
(2008)
Proceedings of 10th Intl. Conf. on Advanced Communication Technology (ICACT 2008)
, pp. 1170-1175
-
-
Lee, J.-H.1
Lee, J.-H.2
Sohn, S.-G.3
Ryu, J.-H.4
Chung, T.-M.5
-
13
-
-
50649094035
-
Random Forests based network intrusion detection systems
-
J. Zhang, M. Zulkernine and A. Haque, Random Forests based network intrusion detection systems, IEEE Trans on System, Man, Cybernetics, Part-C: Applications and Reviews 38(3) (2008), 649-659.
-
(2008)
IEEE Trans on System, Man, Cybernetics, Part-C: Applications and Reviews
, vol.38
, Issue.3
, pp. 649-659
-
-
Zhang, J.1
Zulkernine, M.2
Haque, A.3
-
14
-
-
85019691440
-
Testing Intrusion detection system: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
J. McHugh, Testing Intrusion detection system: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transaction on Information and system security 3(4) (2000), 262-294.
-
(2000)
ACM Transaction on Information and system security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
15
-
-
11144275989
-
Support vector classifiers and network intrusion detection
-
WA, USA, 1
-
John Mill and A. Inoue, Support vector classifiers and network intrusion detection, in: Proceedings of 2009 IEEE Intl. Conf. on Fuzzy System, WA, USA, 1, 2004, pp. 407-410.
-
(2004)
Proceedings of 2009 IEEE Intl. Conf. on Fuzzy System
, pp. 407-410
-
-
Mill, J.1
Inoue, A.2
-
16
-
-
0004048154
-
-
Technical report, Contract 79F296400, J.P. Anderson company, Fort Washington, Pennsylvania
-
J.P. Anderson, Computer Security Threat Monitoring and Surveillance, Technical report, Contract 79F296400, J.P. Anderson company, Fort Washington, Pennsylvania, 1985.
-
(1985)
Computer Security Threat Monitoring and Surveillance
-
-
Anderson, J.P.1
-
17
-
-
56449116627
-
Discriminative parameter learning for Bayesian networks
-
H. Finland, W.W. Cohen, A. McCallum and S.T. Roweis, eds, Jun
-
J. Su, H. Zhang, C.X. Ling and S. Matwin, Discriminative parameter learning for Bayesian networks, in: ACM Proceedings of 25th International Conference on Machine Learning (ICML 2008), H. Finland, W.W. Cohen, A. McCallum and S.T. Roweis, eds, 307, Jun 2008, pp. 1016-1023.
-
(2008)
ACM Proceedings of 25th International Conference on Machine Learning (ICML 2008)
, vol.307
, pp. 1016-1023
-
-
Su, J.1
Zhang, H.2
Ling, C.X.3
Matwin, S.4
-
18
-
-
35248845955
-
Finite mixture model of bounded semi-näıve Bayesian networks classifier
-
Istanbul, Turkey, Jun 2003, Okyay Kaynak, Ethem Alpaydin, Erkki Oja, Lei Xu eds, Lecture notes in computer science, 2714
-
K. Huang, I. King and M.R. Lyu, Finite mixture model of bounded semi-näıve Bayesian networks classifier, in: Proceedings of 10th Intl. Conference on Neural Information Processing (ICONIP-2003), Istanbul, Turkey, Jun 2003, Okyay Kaynak, Ethem Alpaydin, Erkki Oja, Lei Xu eds, Lecture notes in computer science, 2714, pp. 115-122.
-
Proceedings of 10th Intl. Conference on Neural Information Processing (ICONIP-2003)
, pp. 115-122
-
-
Huang, K.1
King, I.2
Lyu, M.R.3
-
19
-
-
0040639069
-
Stacking bagged and dagged models
-
San Francisco, CA
-
K.M. Ting and I.H.Witten, Stacking bagged and dagged models, in: Proceedings of 14th Intl Conf on Machine Learning, San Francisco, CA, 1997, pp. 367-375.
-
(1997)
Proceedings of 14th Intl Conf on Machine Learning
, pp. 367-375
-
-
Ting, K.M.1
Witten, I.H.2
-
20
-
-
72449131513
-
From feature selection to building ofBayesian classifiers: Anetwork intrusion detection perspective
-
K.-C. Khor, C.-Y. Ting and S.-P.Amnuaisuk, From feature selection to building ofBayesian classifiers: Anetwork intrusion detection perspective, American Journal of applied sciences 6(11) (2009), 1949-1960.
-
(2009)
American Journal of applied sciences
, vol.6
, Issue.11
, pp. 1949-1960
-
-
Khor, K.-C.1
Ting, C.-Y.2
Amnuaisuk, S.-P.3
-
21
-
-
0035478854
-
Random Forests
-
L. Breiman, Random Forests, Machine Learning 45 (2001), 5-32.
-
(2001)
Machine Learning
, vol.45
, pp. 5-32
-
-
Breiman, L.1
-
22
-
-
0001972236
-
Addressing the curse of imbalanced training sets: One sided selection
-
D.H. Fisher, ed., Nashville, Tennessee, USA, July, Morgan Kauffman Publisher
-
M. Kubat and S. Matwin, Addressing the curse of imbalanced training sets: one sided selection, in: Proceedings of the 14th International conference on Machine Learning, D.H. Fisher, ed., Nashville, Tennessee, USA, July 1997, pp. 179-186. Morgan Kauffman Publisher.
-
(1997)
Proceedings of the 14th International conference on Machine Learning
, pp. 179-186
-
-
Kubat, M.1
Matwin, S.2
-
24
-
-
71649088415
-
A Hybrid Clustering approach for network intrusion detection usingCOBWEB and FFT
-
M. Panda and M.R. Patra, A Hybrid Clustering approach for network intrusion detection usingCOBWEB and FFT, Journal of Intelligent System 18(3) (2009), 229-245.
-
(2009)
Journal of Intelligent System
, vol.18
, Issue.3
, pp. 229-245
-
-
Panda, M.1
Patra, M.R.2
-
25
-
-
77955847605
-
Toward credible evaluation of anomaly based intrusion detection methods
-
M. Tavallaee, N. Stakhanova and A.A.Ghorbani, Toward credible evaluation of anomaly based intrusion detection methods, IEEE Trans On Syst, Man, and Cybernetics, Part-c: Applications and Reviews 40(5) (2010), 516-524.
-
(2010)
IEEE Trans On Syst, Man, and Cybernetics, Part-c: Applications and Reviews
, vol.40
, Issue.5
, pp. 516-524
-
-
Tavallaee, M.1
Stakhanova, N.2
Ghorbani, A.A.3
-
26
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Lab. Evaluation data for network anomaly detection
-
Pittsburgh, USA, lecture notes in computer science, Sept, Springer
-
M. Mahoney and P. Chan, An analysis of the 1999 DARPA/Lincoln Lab. Evaluation data for network anomaly detection, in: Proceedings of 6th International Symposium Recent Advances in Intrusion Detection (RAID-03), (Vol. 2820), Pittsburgh, USA, lecture notes in computer science, Sept 2003, pp. 220-238. Springer.
-
(2003)
Proceedings of 6th International Symposium Recent Advances in Intrusion Detection (RAID-03)
, vol.2820
, pp. 220-238
-
-
Mahoney, M.1
Chan, P.2
-
27
-
-
77950575061
-
A detailed analysis of the KDD Cup 1999 dataset
-
Ottawa, ON, July, IEEE Press
-
M. Tavallaee, E. Bagheri, W. Lu and A.A. Ghorbani, A detailed analysis of the KDD Cup 1999 dataset, in: Proc. of 2009 IEEE International Symposium onComputational Intelligence in Security and Defence Applications (CISDA-2009), Ottawa, ON, July 2009, 1-6, IEEE Press.
-
(2009)
Proc. of 2009 IEEE International Symposium onComputational Intelligence in Security and Defence Applications (CISDA-2009)
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
28
-
-
78349267223
-
Discriminative multinomial Näıve Bayes for network intrusion detection
-
Aug., USA, 5-10, IEEE Press
-
M. Panda, A. Abraham and M.R.Patra, Discriminative multinomial Näıve Bayes for network intrusion detection, in: Proceedings of 6th Intl. Conf. on Information Assurance and Security (IAS-2010), Aug. 2010, USA, 5-10, IEEE Press.
-
(2010)
Proceedings of 6th Intl. Conf. on Information Assurance and Security (IAS-2010)
-
-
Panda, M.1
Abraham, A.2
Patra, M.R.3
-
30
-
-
84921944039
-
-
accessed on 8-10-2010
-
NSL KDD dataset, http://iscx.ca/NSL-KDD/, accessed on 8-10-2010.
-
NSL KDD dataset
-
-
-
32
-
-
0036508551
-
CSI/FBI computer crime and security survey
-
R. Power, CSI/FBI computer crime and security survey, Computer Security Journal 18(2) (2002), 7-30.
-
(2002)
Computer Security Journal
, vol.18
, Issue.2
, pp. 7-30
-
-
Power, R.1
-
33
-
-
0013029835
-
PNrule: A new framework for learning classifier models in data mining
-
Department of Computer Science, University of Minnesota, Report No-RC 21719
-
R. Agarwal and M.V. Joshi, PNrule: A new framework for learning classifier models in data mining. Technical Report, Department of Computer Science, University of Minnesota, Report No-RC 21719, 2000.
-
(2000)
Technical Report
-
-
Agarwal, R.1
Joshi, M.V.2
-
34
-
-
33750095186
-
Rotation Forest: A new classifier ensemble method
-
IEEE Computer Society Press, USA
-
J.J. Rodriguez, L.I. Kuncheva and C.J. Alonso, Rotation Forest: A new classifier ensemble method, IEEE Transaction on Pattern Analysis and Machine Intelligence 28(10) (2006), 1619-1630, IEEE Computer Society Press, USA.
-
(2006)
IEEE Transaction on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.10
, pp. 1619-1630
-
-
Rodriguez, J.J.1
Kuncheva, L.I.2
Alonso, C.J.3
-
35
-
-
0036085392
-
Intrusion detection using Neural network and support vector machines
-
IEEE Computer Society Press, USA
-
S. Mukkamala, G. Janoski and A.H. Sung, Intrusion detection using Neural network and support vector machines, in: Proceedings of IEEE International Conf. on Neural Networks, 2002, pp. 1702-1707, IEEE Computer Society Press, USA.
-
(2002)
Proceedings of IEEE International Conf. on Neural Networks
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.H.3
-
36
-
-
33750514606
-
Modelling intrusion detection system using hybrid intelligent systems
-
S. Peddabachigari, A. Abraham, C. Grosan and J. Thomas, Modelling intrusion detection system using hybrid intelligent systems, Journal of Network and Computer Applications 30 (2007), 114-132.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
37
-
-
0030708287
-
Local dimensional reduction for locally weighted learning
-
Monterey, California, IEEE Press
-
S. Vijaya Kumar and S. Schaal, Local dimensional reduction for locally weighted learning, in: Proc. of IEEE Intl. Sympo. On Computational Intelligence in Robotics and Automation (CIRA-97), Monterey, California, 220-225, IEEE Press.
-
Proc. of IEEE Intl. Sympo. On Computational Intelligence in Robotics and Automation (CIRA-97)
, pp. 220-225
-
-
Vijaya Kumar, S.1
Schaal, S.2
-
38
-
-
85013599807
-
-
Y. Zhang, ed., In Tech Publisher
-
T.P. Tran, P. Tsai, T. Jan and X. Kong, Network Intrusion Detection Using Machine Learning and Voting Techniques, Y. Zhang, ed., 2010, In Tech Publisher.
-
(2010)
Network Intrusion Detection Using Machine Learning and Voting Techniques
-
-
Tran, T.P.1
Tsai, P.2
Jan, T.3
Kong, X.4
-
39
-
-
74049129143
-
ANTIDS: Self organised Antbased clustering model for intrusion detection system
-
Japan, Ajith Abraham et al., eds, Advances in Soft Computing
-
V. Ramos and A. Abraham, ANTIDS: self organised Antbased clustering model for intrusion detection system, in: Proceedings of 4th IEEE International Workshop on Soft Computing as Transdisciplinary Science and Technology (WSTST 2005), Japan, Ajith Abraham et al., eds, Advances in Soft Computing, 29 (2005), 977-986.
-
(2005)
Proceedings of 4th IEEE International Workshop on Soft Computing as Transdisciplinary Science and Technology (WSTST 2005)
, vol.29
, pp. 977-986
-
-
Ramos, V.1
Abraham, A.2
-
41
-
-
0003267366
-
Datamining approach for intrusion detection
-
Berkely, CA, USA
-
W. Lee and J. Stolfo, Datamining approach for intrusion detection, in: Proceedings of the 7th USENIX security symposium (SECURITY-98), Berkely, CA, USA, 79-94.
-
Proceedings of the 7th USENIX security symposium (SECURITY-98)
, pp. 79-94
-
-
Lee, W.1
Stolfo, J.2
-
42
-
-
84885774862
-
A framework for constructing features andmodels for intrusion detection systems
-
W. Lee and J. Stolfo, A framework for constructing features andmodels for intrusion detection systems, ACMTransactions on Information and System Security (TISSEC) 3(4) (2000), 227-261.
-
(2000)
ACMTransactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, J.2
-
43
-
-
0031211090
-
A decision theoretic generalization of on-line learning and an application to boosting
-
Y. Freund and R.E. Schapire, A decision theoretic generalization of on-line learning and an application to boosting, Journal of Computer and System Sciences 55(1) (1997), 119-139.
-
(1997)
Journal of Computer and System Sciences
, vol.55
, Issue.1
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
|